True-Demon / DeeDee
Stealthy DDE Exploit Payload generator and injector for DOCX files
☆16Updated 6 years ago
Related projects: ⓘ
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆26Updated 7 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Updated last year
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- ☆24Updated 6 years ago
- A C# DLL to Dump LSA Secrets☆56Updated 6 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Simple C2 over the Trello API☆37Updated last year
- ☆18Updated this week
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated last year
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- C2 and Post Exploitation Code☆34Updated 2 weeks ago
- PowerShell Reverse HTTPs Shell☆26Updated 9 years ago
- medium-rare☆27Updated 4 years ago
- Methods of C2☆21Updated 9 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- ☆15Updated 4 years ago
- ☆12Updated this week